From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Gathering Cyber Threat Intelligence from Twitter Using Novelty Classification., , , и . CW, стр. 316-323. IEEE, (2019)Reducing Knowledge Noise for Improved Semantic Analysis in Biomedical Natural Language Processing Applications., , , , , и . ClinicalNLP@ACL, стр. 272-277. Association for Computational Linguistics, (2023)Analyzing Emergent Users' Text Messages Data and Exploring Its Benefits., , , и . IEEE Access, (2019)Are we always in strife? A longitudinal study of the echo chamber effect in the Australian Twittersphere., , , , , , и . CoRR, (2022)Data analysis and call prediction on dyadic data from an understudied population., , , , и . Pervasive Mob. Comput., (2017)Real-time Detection of Content Polluters in Partially Observable Twitter Networks., , , , и . WWW (Companion Volume), стр. 1331-1339. ACM, (2018)RUHate-MM: Identification of Hate Speech and Targets using Multimodal Data from Russia-Ukraine Crisis., , , , и . WWW (Companion Volume), стр. 1854-1863. ACM, (2024)On Temporal Regularity in Social Interactions: Predicting Mobile Phone Calls., , , и . CoRR, (2015)On commenting behavior of Facebook users., , , и . HT, стр. 179-183. ACM, (2013)An Energy Efficient Cooperative Hierarchical MIMO Clustering Scheme for Wireless Sensor Networks., , и . Sensors, 12 (1): 92-114 (2012)